General

  • Target

    2024-04-08_445f6a34455d8db860456cef11946c1e_cryptolocker

  • Size

    36KB

  • MD5

    445f6a34455d8db860456cef11946c1e

  • SHA1

    7663667f77e76138d775801f64265f8ff0a8f804

  • SHA256

    2ecddd9351d9a823a289f02d3f4682ba7a1ea4fe2e486270edf49c584eb44141

  • SHA512

    cc72c4772ae83627a800fcb44931c434918713b9e89cabc50d991a504c7dfecc5616028a66c34c31a5a9a624d99bfc474b7a900a54c8636310b5343c7ea5590f

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITa:qDdFJy3QMOtEvwDpjjWMl7Ta

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_445f6a34455d8db860456cef11946c1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections